The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

Microsoft just issued a patch for a zero-day vulnerability in Internet Explorer that has been exploited in several attacks. In one of the cases, a compromised website was hosting malicious code that generated an iframe overlay designed to look like the website itself. This then redirected unsuspecting victims to another website that installed a seemingly innocent file (java.html) that… Read more

Tags: internet explorer, zeroday

Greetings! You all really seemed to like my last post on Dynamic DNS, so I've been invited to come back and talk more about it. In part 1 , we discussed the uses of Dynamic DNS, as well as the various providers of the service and how it all works. We then discussed that while Dynamic DNS may not malicious in… Read more

Tags:

I’ll start this post with the Rifleman’s Creed. This is my rifle. There are many like it, but this one is mine. My rifle is my best friend. It is my life. I must master it as I must master my life. My rifle, without me, is useless. Without my rifle, I am useless. I must… Read more

Tags:

With more than 100+ information security conferences and events taking place in the US each year, it can be a challenge to decide which ones to attend. Following is my take on the must attend events and why. Conferences bring together leading vendors, speakers, thought-leaders and clients to network, discuss trends, and display new cyber security products and solutions. Before we… Read more

Tags:

Imagine that you are at a cricket match and a stray “6” heads straight for your friend's face who is sitting next to you. You may think at first “phew, thankfully that avoided me so I am not in danger!” but another thought could be “I'd better save my friend before he gets a… Read more

Tags: threat intellligence, cybercrime

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Chat